K-12 Computer Science Standards

Nevada Cybersecurity 2

60 Standards

1

8.1.1

Describe the steps of the cybersecurity lifecycle (e.g., people, process and tools)

2

8.1.2

Write a set of principles, rules, and practices to provide guidance and direction

3

8.1.3

Follow appropriate decision-making model to determine correct response procedures

4

8.2.1

Plan, prepare, and develop scope for a Cyber Incident Response Plan

5

8.2.2

Determine correct detection, mitigation, and reporting processes

6

8.2.3

Evaluate assessment and decision-making steps when handling an incident or event

7

8.2.4

Determine correct investigative procedures

8

8.2.5

Gather intelligence from a variety of sources including open source and others

9

8.2.6

Document intelligence gathering efforts including who, what, when, where, why, and how

10

8.2.7

Determine extent of event or incident scope including severity

11

8.2.8

Determine correct containment steps based on the type of incident or event encountered

12

8.2.9

Implement the correct eradication response and processes

13

8.2.10

Determine next steps post investigation (post breach) from legal, HR, news media response

14

8.3.1

Determine the appropriate security control, technique or process based on the property, system or data you are protecting

15

8.3.2

Explain the importance of security controls, techniques, and threat risk assessments

16

8.3.3

Select the appropriate solution to eliminate vulnerabilities and establish a security baseline

17

8.3.4

Develop plans to protect a variety of property, systems, or data

18

8.3.5

Implement the appropriate controls to ensure security of property, systems, or data

19

8.3.6

Compare and contrast alternative methods to mitigate security risks for data in transit and data at rest

20

8.4.1

Describe the digital chain of custody process for tracking data and equipment (legal evidence)

21

8.4.2

Describe all steps to capture and maintain evidence

22

8.4.3

Follow chain of custody procedures

23

8.4.4

Maintain detailed records (e.g., chain of custody forms, evidence collection forms, etc.)

24

8.4.5

Track digital evidence (e.g., how it has been gathered, tracked, and protected)

25

8.4.6

Describe a chain of custody

26

8.4.7

Develop a plan for data transport, encryption to avoid alteration of data and legal holds

27

8.4.8

Develop a plan for recovery, disposal of evidence, and follow up

28

8.4.9

Write a forensics summary report

29

9.1.1

Summarize basic forensic concepts and practices including eDiscovery, documentation, chain of custody, and data transport

30

9.1.2

Determine a first responder’s logical approach during an investigation with objective, evidence-based research

31

9.1.3

Review the First Responder steps and processes for proper documentation

32

9.1.4

Explain what eDiscovery is including the contextual process for electronic evidence collection (Electronically Stored Information ESI)

33

9.1.5

Observe and discuss legal restrictions, stipulations, regulatory compliance, and confidentiality when gathering evidence

34

9.1.6

Summarize Chain of Custody processes during investigations

35

9.2.1

Explain the proper use of penetration testing versus vulnerability scanning

36

9.2.2

Explain the many types of vulnerabilities, exploits, and cyber threats a First Responder encounters

37

9.2.3

Discover the common types of cyber threat actors including Cybercriminals, Attention-Seekers, Hacktivists, Jihadi Hackers, and Nation States

38

9.2.4

Explain and summarize the common cybersecurity attacks including the preferred tactics, techniques, and procedures (TTPS) of threat actors

39

9.2.5

Examine and summarize the targets of cyber threat actors including governments, military agencies, non-profits, and businesses across sectors including retail, legal, energy, healthcare, technology, entertainment, and telecommunications

40

9.2.6

Review and examine geopolitical flashpoints (e.g., U.S.-China Relations, Iranian Nuclear Accord, Economic Sanctions on Russia, Syrian Conflict, ISIS-related Activity, North Korean Policy, StateSponsored Cyber Activity, Cybersecurity Regulations)

41

9.3.1

Describe and demonstrate various methods and tools for threat detection and eDiscovery

42

9.3.2

Describe and demonstrate vulnerability management methods, practices, and scanning tools

43

9.3.3

Describe and demonstrate various practices, methods, and tools for penetration testing

44

9.3.4

Identify encryption methods and demonstrate tools to decipher encrypted data

45

9.3.5

Review basic cryptography concepts, methods, and its relationship to forensics

46

9.3.6

Identify Web application exploits, vulnerabilities

47

9.3.7

Describe and demonstrate Web Application Security and Scanning methods and tools

48

9.3.8

Identify methods or tools to eliminate cloud exploits and vulnerabilities

49

9.3.9

Describe and demonstrate a working knowledge of phishing attacks and mitigation steps

50

9.4.1

Explain what malware is including its history

51

9.4.2

Review and define the most common malware terminologies

52

9.4.3

Describe the ways and methods malware is spread

53

9.4.4

Review the types of malware specifically examining viruses, worms, trojan horses, rootkits ransomware, keyloggers, and grayware attack

54

9.4.5

Choose one malware scenario and select the appropriate type of mitigation and deterrent techniques

55

9.4.6

Use appropriate tools and techniques to eliminate malware from spreading

56

10.1.1

Explain Artificial Intelligence (AI), potential applications, concerns, and opportunities in relation to security issues

57

10.1.2

Describe machine learning and potential applications, concerns, and opportunities

58

10.1.3

Explain the role of ethics as it relates to security and emerging technologies

59

10.2.1

Describe job skills needed for potential careers in new and emerging technologies

60

10.2.2

Explore potential uses for and industries that may use emerging technologies

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program